• 08:00
  • Introduction to Cryptographic Attacks

    Matt Cheung
    Tue, 08:00 - 11:55
    Training Ground
  • Mobile Application Hacking - Master Class

    Sneha Rajguru
    Tue, 08:00 - 17:55
    Training Ground
  • Intro to Industrial Control System Network Analysis

    Dennis Murphy
    Tue, 08:00 - 17:55
    Training Ground
  • Windows Internals and Local Attack Surface Analysis using Powershell

    James Forshaw
    Tue, 08:00 - 11:55
    Training Ground
  • Network Security Monitoring

    Liam Randall
    Tue, 08:00 - 17:55
    Training Ground
  • 10:00
  • Cold Case Cyber Investigations: Catfishing Cooper and Other Ops

    Jim Christy
    Tue, 10:00 - 10:55
    Keynote
  • 11:00
  • The Best of Security BSides Now and Then: Ten Years of Mixes

    Jack Daniel
    Tue, 11:00 - 11:25
    Keynote
  • Hillbilly Storytime - Pentest Fails

    Adam Compton
    Tue, 11:00 - 11:55
    Ground Floor
  • 11:20
  • Keynote Q&A; and Meet & Greet with Jim Christy

    Jim Christy
    Tue, 11:20 - 12:25
    Underground
  • 11:30
  • ATT&CKing; the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK;

    Katie Nickels, John Wunder
    Tue, 11:30 - 12:25
    Breaking Ground
  • Who Wants to Be A Regulator: The IoT Security Game Show

    Jen Ellis, Wendy Knox Everette, Allan Friedman, Whitney Merrill
    Tue, 11:30 - 12:55
    Common Ground
  • The Chrome Crusader

    Lily Chalupowski
    Tue, 11:30 - 12:25
    Ground1234!
  • TBD

     
    Tue, 11:30 - 12:25
    Ground Floor
  • Get on the Eye Level: Tailoring the Security Talk

    Fahmida Rashid
    Tue, 11:30 - 12:25
    Ground Floor
  • 101 ways to fail at getting value out of your investments in security analytics, and how not to do that

    Jon Hawes
    Tue, 11:30 - 12:25
    Ground Truth
  • Lesley Carhart Kicks Off Hire Ground

    Lesley Carhart
    Tue, 11:30 - 12:00
    Hire Ground
  • Intro Session

     
    Tue, 11:30 - 12:25
    I Am The Cavalry
  • 12:00
  • From Hacker to Serial Entreprenuer

    Matt Devost
    Tue, 12:00 - 12:55
    Hire Ground
  • Resume Review & Career Coaching

     
    Tue, 12:00 - 18:00
    Hire Ground
  • 14:00
  • SiliVaccine: North Korea's Weapon of Mass Detection

    Michael Kajiloti, Mark Lechtik
    Tue, 14:00 - 14:55
    Breaking Ground
  • How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises

    Chris Kubecka
    Tue, 14:00 - 14:55
    Common Ground
  • Active Directory Password Blacklisting

    Leeren Chang
    Tue, 14:00 - 14:55
    Ground1234!
  • Who Watches the Watchers?: Understanding the Internet's Background Noise

    Curt Barnard
    Tue, 14:00 - 14:55
    Ground Floor
  • An Introduction to Machine Learning and Deep Learning

    Hillary Sanders
    Tue, 14:00 - 14:55
    Ground Truth
  • Engaging the Media: Know Your Target

    Joe Cox, Jen Ellis, Sean Gallagher, Steve Ragan, Paul Wagenseil
    Tue, 14:00 - 14:55
    I Am The Cavalry
  • Social engineering at scale, for fun

    Sara Jayne Terp
    Tue, 14:00 - 14:25
    Proving Ground
  • Deep Dive into NMAP & Network Scanning

    Michael Wylie
    Tue, 14:00 - 17:55
    Training Ground
  • Snake Oil & The Security Industry

    dave cole
    Tue, 14:00 - 14:55
    Underground
  • 14:30
  • You're Good and You Should Feel Good

    Victor Wieczorek
    Tue, 14:30 - 15:00
    Hire Ground
  • Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement

    Courtney K
    Tue, 14:30 - 14:55
    Proving Ground
  • 15:00
  • JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else

    Guy Barnhart-Magen, Ezra Caltum
    Tue, 15:00 - 15:55
    Breaking Ground
  • Red Teaming a Manufacturing Network (Without Crashing It)

    Kyle Cucci, Jonathan Medina
    Tue, 15:00 - 15:55
    Common Ground
  • Anatomy of NTLMv1/NTLMv1-SSP

    Evil Mog
    Tue, 15:00 - 15:55
    Ground1234!
  • Lessons Learned by the WordPress Security Team

    Aaron D Campbell
    Tue, 15:00 - 15:55
    Ground Floor
  • Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification

    Mark Mager
    Tue, 15:00 - 15:55
    Ground Truth
  • The Long Way Around – from Software Engineering to Cyber Security (How Choosing Wrong Turned out to be Right)

    Margaret White
    Tue, 15:00 - 15:30
    Hire Ground
  • Engaging the Media: Telling Your Story

    Sean Gallagher, Steve Ragan, Iain Thomson, Paul Wagenseil
    Tue, 15:00 - 15:55
    I Am The Cavalry
  • Building A Teaching / Improvement Focused SOC

    Andrew Gish-Johnson
    Tue, 15:00 - 15:25
    Proving Ground
  • A peek into the cyber security of the aviation Industry.

    Nitha Suresh
    Tue, 15:00 - 15:55
    Underground
  • 15:30
  • Modern Political Warfare: A Look at Strategy and TTPs

    Sina Kashefipour
    Tue, 15:30 - 15:55
    Proving Ground
  • 17:00
  • Attacking Ethereum dApps

    Brandon Arvanaghi
    Tue, 17:00 - 17:55
    Breaking Ground
  • An Encyclopedia of Wiretaps

    Wendy Knox Everette
    Tue, 17:00 - 17:55
    Common Ground
  • Fighting Fraud in the Trenches

    Amir Shaked
    Tue, 17:00 - 17:55
    Ground1234!
  • Sight beyond sight: Detecting phishing with computer vision.

    Daniel Grant
    Tue, 17:00 - 17:55
    Ground Truth
  • A Good Day to Die? IoT End of Life

    Allan Friedman, Karl Grindal, Jessica Wilkerson
    Tue, 17:00 - 17:55
    I Am The Cavalry
  • Legendary Defender - The Voltron Analogy

    Brian Carey
    Tue, 17:00 - 17:25
    Proving Ground
  • That Buzzword Bingo Rapid Debates Panel Thing

    Joshua Corman, Jen Ellis, Rob Graham, Chris Nickerson
    Tue, 17:00 - 18:55
    Underground
  • 17:30
  • Redefining the Hacker

    Manju Mude
    Tue, 17:30 - 18:00
    Hire Ground
  • Not your Grandpa's Password Policy

    Kevin T Neely
    Tue, 17:30 - 17:55
    Proving Ground
  • 18:00
  • Serverless Infections: Malware Just Found a New Home

    Maty Siman
    Tue, 18:00 - 18:55
    Breaking Ground
  • You're just complaining because you're guilty: A Guide for Citizens and Hackers to Adversarial Testing of Software Used In the Criminal Justice System

    Nate Adams, Jerome Greco, Dr. Jeanna N. Matthews
    Tue, 18:00 - 18:55
    Common Ground
  • The Effect of Constraints on the Number of Viable Permutations of Passwords

    Randy Abrams, Briana Butler
    Tue, 18:00 - 18:55
    Ground1234!
  • Catch me, Yes we can! -Pwning Social Engineers using Natural Language Processing Techniques in real-time

    Marcel Carlsson, Ian Harris
    Tue, 18:00 - 18:55
    Ground Truth
  • What Did We Learn from Today? (Recruiter Panel)

    Briana Fernandez, Scott Handley, Kris Rides
    Tue, 18:00 - 18:30
    Hire Ground
  • Cyber Safety Disclosure

    Nina Alli, Joshua Corman, Jerome Radcliffe, Suzanne Schwartz, MD
    Tue, 18:00 - 18:55
    I Am The Cavalry
  • Vulnerability Management 101: Practical Experience and Recommendations

    Eric Bryan
    Tue, 18:00 - 18:25
    Proving Ground
  • 18:30
  • What is Agile and how can I use it well?

    Nicole Schwartz
    Tue, 18:30 - 18:55
    Proving Ground